Analysis
-
max time kernel
160s -
max time network
177s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 13:00
Static task
static1
Behavioral task
behavioral1
Sample
8aa46a6f36b43fe3acfc0760043e422b.exe
Resource
win7-en-20211208
General
-
Target
8aa46a6f36b43fe3acfc0760043e422b.exe
-
Size
890KB
-
MD5
8aa46a6f36b43fe3acfc0760043e422b
-
SHA1
d608338ee741b1be87b008695fe9b454ec21e50e
-
SHA256
76394f4e3ec34930503e6868befb7fa251b1550577cc4d6861ffdc638bd1acb2
-
SHA512
57cc0c6d608c8babf075daf9c3a1d465f590acd8331629f025ee5c1b62fd2c3f4ad558fbc093b0ee6a2d52502ce2d8d1c25e3dcc04051293ae6f085cf2afb5ec
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2528-119-0x0000000000890000-0x0000000000950000-memory.dmp family_redline behavioral2/memory/2528-123-0x0000000000890000-0x0000000000950000-memory.dmp family_redline behavioral2/memory/2528-124-0x0000000000890000-0x0000000000950000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
build.exebuild1.exeservices.exepid process 428 build.exe 836 build1.exe 5020 services.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\build1.exe vmprotect C:\Users\Admin\AppData\Local\Temp\build1.exe vmprotect behavioral2/memory/836-146-0x0000000000400000-0x0000000001049000-memory.dmp vmprotect C:\Users\Admin\AppData\Roaming\Microsoft\services.exe vmprotect C:\Users\Admin\AppData\Roaming\Microsoft\services.exe vmprotect behavioral2/memory/5020-279-0x0000000000400000-0x0000000001049000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
8aa46a6f36b43fe3acfc0760043e422b.exepid process 2528 8aa46a6f36b43fe3acfc0760043e422b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
8aa46a6f36b43fe3acfc0760043e422b.exebuild.exebuild1.exepowershell.exepowershell.exeservices.exepowershell.exepowershell.exepid process 2528 8aa46a6f36b43fe3acfc0760043e422b.exe 2528 8aa46a6f36b43fe3acfc0760043e422b.exe 2528 8aa46a6f36b43fe3acfc0760043e422b.exe 428 build.exe 428 build.exe 428 build.exe 428 build.exe 836 build1.exe 836 build1.exe 2656 powershell.exe 2656 powershell.exe 2656 powershell.exe 1968 powershell.exe 1968 powershell.exe 1968 powershell.exe 5020 services.exe 5020 services.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 1772 powershell.exe 1772 powershell.exe 1772 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
8aa46a6f36b43fe3acfc0760043e422b.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2528 8aa46a6f36b43fe3acfc0760043e422b.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeIncreaseQuotaPrivilege 2656 powershell.exe Token: SeSecurityPrivilege 2656 powershell.exe Token: SeTakeOwnershipPrivilege 2656 powershell.exe Token: SeLoadDriverPrivilege 2656 powershell.exe Token: SeSystemProfilePrivilege 2656 powershell.exe Token: SeSystemtimePrivilege 2656 powershell.exe Token: SeProfSingleProcessPrivilege 2656 powershell.exe Token: SeIncBasePriorityPrivilege 2656 powershell.exe Token: SeCreatePagefilePrivilege 2656 powershell.exe Token: SeBackupPrivilege 2656 powershell.exe Token: SeRestorePrivilege 2656 powershell.exe Token: SeShutdownPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeSystemEnvironmentPrivilege 2656 powershell.exe Token: SeRemoteShutdownPrivilege 2656 powershell.exe Token: SeUndockPrivilege 2656 powershell.exe Token: SeManageVolumePrivilege 2656 powershell.exe Token: 33 2656 powershell.exe Token: 34 2656 powershell.exe Token: 35 2656 powershell.exe Token: 36 2656 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeIncreaseQuotaPrivilege 1968 powershell.exe Token: SeSecurityPrivilege 1968 powershell.exe Token: SeTakeOwnershipPrivilege 1968 powershell.exe Token: SeLoadDriverPrivilege 1968 powershell.exe Token: SeSystemProfilePrivilege 1968 powershell.exe Token: SeSystemtimePrivilege 1968 powershell.exe Token: SeProfSingleProcessPrivilege 1968 powershell.exe Token: SeIncBasePriorityPrivilege 1968 powershell.exe Token: SeCreatePagefilePrivilege 1968 powershell.exe Token: SeBackupPrivilege 1968 powershell.exe Token: SeRestorePrivilege 1968 powershell.exe Token: SeShutdownPrivilege 1968 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeSystemEnvironmentPrivilege 1968 powershell.exe Token: SeRemoteShutdownPrivilege 1968 powershell.exe Token: SeUndockPrivilege 1968 powershell.exe Token: SeManageVolumePrivilege 1968 powershell.exe Token: 33 1968 powershell.exe Token: 34 1968 powershell.exe Token: 35 1968 powershell.exe Token: 36 1968 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeIncreaseQuotaPrivilege 4208 powershell.exe Token: SeSecurityPrivilege 4208 powershell.exe Token: SeTakeOwnershipPrivilege 4208 powershell.exe Token: SeLoadDriverPrivilege 4208 powershell.exe Token: SeSystemProfilePrivilege 4208 powershell.exe Token: SeSystemtimePrivilege 4208 powershell.exe Token: SeProfSingleProcessPrivilege 4208 powershell.exe Token: SeIncBasePriorityPrivilege 4208 powershell.exe Token: SeCreatePagefilePrivilege 4208 powershell.exe Token: SeBackupPrivilege 4208 powershell.exe Token: SeRestorePrivilege 4208 powershell.exe Token: SeShutdownPrivilege 4208 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeSystemEnvironmentPrivilege 4208 powershell.exe Token: SeRemoteShutdownPrivilege 4208 powershell.exe Token: SeUndockPrivilege 4208 powershell.exe Token: SeManageVolumePrivilege 4208 powershell.exe Token: 33 4208 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
8aa46a6f36b43fe3acfc0760043e422b.exebuild1.execmd.execmd.execmd.exeservices.execmd.exedescription pid process target process PID 2528 wrote to memory of 428 2528 8aa46a6f36b43fe3acfc0760043e422b.exe build.exe PID 2528 wrote to memory of 428 2528 8aa46a6f36b43fe3acfc0760043e422b.exe build.exe PID 2528 wrote to memory of 836 2528 8aa46a6f36b43fe3acfc0760043e422b.exe build1.exe PID 2528 wrote to memory of 836 2528 8aa46a6f36b43fe3acfc0760043e422b.exe build1.exe PID 836 wrote to memory of 2456 836 build1.exe cmd.exe PID 836 wrote to memory of 2456 836 build1.exe cmd.exe PID 2456 wrote to memory of 2656 2456 cmd.exe powershell.exe PID 2456 wrote to memory of 2656 2456 cmd.exe powershell.exe PID 2456 wrote to memory of 1968 2456 cmd.exe powershell.exe PID 2456 wrote to memory of 1968 2456 cmd.exe powershell.exe PID 836 wrote to memory of 2636 836 build1.exe cmd.exe PID 836 wrote to memory of 2636 836 build1.exe cmd.exe PID 2636 wrote to memory of 400 2636 cmd.exe schtasks.exe PID 2636 wrote to memory of 400 2636 cmd.exe schtasks.exe PID 836 wrote to memory of 752 836 build1.exe cmd.exe PID 836 wrote to memory of 752 836 build1.exe cmd.exe PID 752 wrote to memory of 5020 752 cmd.exe services.exe PID 752 wrote to memory of 5020 752 cmd.exe services.exe PID 5020 wrote to memory of 1944 5020 services.exe cmd.exe PID 5020 wrote to memory of 1944 5020 services.exe cmd.exe PID 1944 wrote to memory of 4208 1944 cmd.exe powershell.exe PID 1944 wrote to memory of 4208 1944 cmd.exe powershell.exe PID 1944 wrote to memory of 1772 1944 cmd.exe powershell.exe PID 1944 wrote to memory of 1772 1944 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aa46a6f36b43fe3acfc0760043e422b.exe"C:\Users\Admin\AppData\Local\Temp\8aa46a6f36b43fe3acfc0760043e422b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\build1.exe"C:\Users\Admin\AppData\Local\Temp\build1.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\services.exeC:\Users\Admin\AppData\Roaming\Microsoft\services.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="6⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
8592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
617323aa789a1614d5eb75e3280751d3
SHA1b4f7d099fca037126337e13cb75820032b9f9118
SHA25658cf6a10b7328c5c34c62e638a7c03a92a036f1fd04325a7d30e19e9c798c1d1
SHA512fd1650bcd37f9d964a5216e6088856dbb9f3ab583f3bd0144f085b29231c05a53589de4e0b20ebde496884be5880299c1c94c5a8133e68a1476739b136c76be1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
de6ae83687f1a98aabfcaaecd1d3e5f3
SHA1db468245b3b1d4474a2b669d0a65f0b3b17b2525
SHA25623e420cdf450eb1d545c765d5f2ac56cff75f469a376c45fda5add8ae714df59
SHA5123c58e38b45d3eabd54298df17640ed2e69fd43a991fd34bcaecb193371750d8f5eece82a796ec257fece551209ade0ad90d75d2327f3128302782b6aa631de9b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
981ed2b78d5335081b7690f14a95f255
SHA14961ef8eb801823bf6f12e7567c23a2550c265b9
SHA256b26960040af3d6a1ea2d907bf63c11a041485ef13f01aede2e0b58543120fdd0
SHA512ec8cc55b9ec0bb1f1aca7aab15ffc84d3bccc4d9935e0c88a6fb383e40ea47e36bc828d08cec7a5148cb45f737174cff4703e7c70ff633bcbcdf0a495418abb6
-
C:\Users\Admin\AppData\Local\Temp\build.exeMD5
addfdc6395f84f4a377423f212e1fa27
SHA176e545e10c939e030b66f2efc7b7370219cbe21f
SHA25616baebd1adfc1bae6e35773b383875ac831a011fefed63a0506b875596274b8c
SHA512a190fdc39919b39263fe9354dc01aad5a63243c3c9c86d5e967bb9d7f9a631a6a3ba2c61ee82bcaf2b499350d94f11307141ccd0772ebf25280e4329855c541f
-
C:\Users\Admin\AppData\Local\Temp\build1.exeMD5
e29226dfb3319c09c118027d68017f11
SHA1c30b6a6e94b630c602fd365668638af463d6a0c3
SHA2564f91e4f43561ff1fb717505dda23724c0184f5dea64bf0aadd0bbb88de71a4db
SHA512dd60b68dc42be4027d5b21a8f5e0889c65c725f1491e32601b74649a20fad271ba88323faeacae204852051cb8e02806111b8e2f237aa0b9332428df8999aee3
-
C:\Users\Admin\AppData\Local\Temp\build1.exeMD5
e29226dfb3319c09c118027d68017f11
SHA1c30b6a6e94b630c602fd365668638af463d6a0c3
SHA2564f91e4f43561ff1fb717505dda23724c0184f5dea64bf0aadd0bbb88de71a4db
SHA512dd60b68dc42be4027d5b21a8f5e0889c65c725f1491e32601b74649a20fad271ba88323faeacae204852051cb8e02806111b8e2f237aa0b9332428df8999aee3
-
C:\Users\Admin\AppData\Roaming\Microsoft\services.exeMD5
e29226dfb3319c09c118027d68017f11
SHA1c30b6a6e94b630c602fd365668638af463d6a0c3
SHA2564f91e4f43561ff1fb717505dda23724c0184f5dea64bf0aadd0bbb88de71a4db
SHA512dd60b68dc42be4027d5b21a8f5e0889c65c725f1491e32601b74649a20fad271ba88323faeacae204852051cb8e02806111b8e2f237aa0b9332428df8999aee3
-
C:\Users\Admin\AppData\Roaming\Microsoft\services.exeMD5
e29226dfb3319c09c118027d68017f11
SHA1c30b6a6e94b630c602fd365668638af463d6a0c3
SHA2564f91e4f43561ff1fb717505dda23724c0184f5dea64bf0aadd0bbb88de71a4db
SHA512dd60b68dc42be4027d5b21a8f5e0889c65c725f1491e32601b74649a20fad271ba88323faeacae204852051cb8e02806111b8e2f237aa0b9332428df8999aee3
-
memory/836-275-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-155-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-182-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-181-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-166-0x0000000002E90000-0x000000000307B000-memory.dmpFilesize
1.9MB
-
memory/836-184-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-179-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-178-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-276-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-185-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-172-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-193-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-192-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-191-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-190-0x000000001C256000-0x000000001C257000-memory.dmpFilesize
4KB
-
memory/836-188-0x000000001C250000-0x000000001C252000-memory.dmpFilesize
8KB
-
memory/836-189-0x000000001C253000-0x000000001C255000-memory.dmpFilesize
8KB
-
memory/836-187-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-186-0x0000000002CD0000-0x0000000002CE2000-memory.dmpFilesize
72KB
-
memory/836-146-0x0000000000400000-0x0000000001049000-memory.dmpFilesize
12.3MB
-
memory/836-148-0x00007FFE4CCF0000-0x00007FFE4CCF2000-memory.dmpFilesize
8KB
-
memory/836-149-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-150-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-151-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-152-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-153-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-154-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-183-0x000000001C450000-0x000000001C63A000-memory.dmpFilesize
1.9MB
-
memory/836-156-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-157-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-158-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-159-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-160-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-161-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-162-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-163-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-164-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-165-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-180-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-167-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-168-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-169-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-170-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-171-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-177-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-173-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-174-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-175-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/836-176-0x00007FFE4CBB5DA0-0x00007FFE4CC85DA0-memory.dmpFilesize
832KB
-
memory/1772-399-0x00000150F0E90000-0x00000150F0EC0000-memory.dmpFilesize
192KB
-
memory/1772-400-0x00000150F0E90000-0x00000150F0EC0000-memory.dmpFilesize
192KB
-
memory/1772-401-0x00000150F0E90000-0x00000150F0EC0000-memory.dmpFilesize
192KB
-
memory/1772-402-0x00000150F0E90000-0x00000150F0EC0000-memory.dmpFilesize
192KB
-
memory/1968-247-0x000001CF1DA20000-0x000001CF1DA40000-memory.dmpFilesize
128KB
-
memory/1968-248-0x000001CF1DA20000-0x000001CF1DA40000-memory.dmpFilesize
128KB
-
memory/2528-131-0x0000000005AB0000-0x0000000005C72000-memory.dmpFilesize
1.8MB
-
memory/2528-119-0x0000000000890000-0x0000000000950000-memory.dmpFilesize
768KB
-
memory/2528-128-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/2528-118-0x0000000002C50000-0x0000000002C94000-memory.dmpFilesize
272KB
-
memory/2528-123-0x0000000000890000-0x0000000000950000-memory.dmpFilesize
768KB
-
memory/2528-124-0x0000000000890000-0x0000000000950000-memory.dmpFilesize
768KB
-
memory/2528-142-0x0000000007D40000-0x000000000826C000-memory.dmpFilesize
5.2MB
-
memory/2528-141-0x0000000007BF0000-0x0000000007C40000-memory.dmpFilesize
320KB
-
memory/2528-140-0x0000000005A60000-0x0000000005A7E000-memory.dmpFilesize
120KB
-
memory/2528-139-0x0000000005C80000-0x0000000005D12000-memory.dmpFilesize
584KB
-
memory/2528-129-0x00000000057D0000-0x00000000058DA000-memory.dmpFilesize
1.0MB
-
memory/2528-130-0x00000000056C0000-0x00000000056FE000-memory.dmpFilesize
248KB
-
memory/2528-138-0x0000000005960000-0x00000000059D6000-memory.dmpFilesize
472KB
-
memory/2528-134-0x0000000005700000-0x000000000574B000-memory.dmpFilesize
300KB
-
memory/2528-132-0x0000000074090000-0x0000000074614000-memory.dmpFilesize
5.5MB
-
memory/2528-133-0x0000000074920000-0x0000000075C68000-memory.dmpFilesize
19.3MB
-
memory/2528-122-0x0000000076570000-0x0000000076661000-memory.dmpFilesize
964KB
-
memory/2528-121-0x00000000761D0000-0x0000000076392000-memory.dmpFilesize
1.8MB
-
memory/2528-137-0x00000000058F0000-0x0000000005956000-memory.dmpFilesize
408KB
-
memory/2528-136-0x00000000068F0000-0x0000000006DEE000-memory.dmpFilesize
5.0MB
-
memory/2528-125-0x0000000072120000-0x00000000721A0000-memory.dmpFilesize
512KB
-
memory/2528-135-0x0000000070370000-0x00000000703BB000-memory.dmpFilesize
300KB
-
memory/2528-127-0x0000000005660000-0x0000000005672000-memory.dmpFilesize
72KB
-
memory/2528-126-0x0000000005DE0000-0x00000000063E6000-memory.dmpFilesize
6.0MB
-
memory/2528-120-0x0000000000F40000-0x0000000000F41000-memory.dmpFilesize
4KB
-
memory/2656-204-0x000001A9774F0000-0x000001A977566000-memory.dmpFilesize
472KB
-
memory/2656-211-0x000001A974FF6000-0x000001A974FF8000-memory.dmpFilesize
8KB
-
memory/2656-199-0x000001A976FD0000-0x000001A976FF2000-memory.dmpFilesize
136KB
-
memory/2656-210-0x000001A974FF3000-0x000001A974FF5000-memory.dmpFilesize
8KB
-
memory/2656-209-0x000001A974FF0000-0x000001A974FF2000-memory.dmpFilesize
8KB
-
memory/4208-398-0x000001A095DF0000-0x000001A0ADF00000-memory.dmpFilesize
385.1MB
-
memory/5020-287-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-337-0x000000001C904000-0x000000001C906000-memory.dmpFilesize
8KB
-
memory/5020-289-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-290-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-281-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-279-0x0000000000400000-0x0000000001049000-memory.dmpFilesize
12.3MB
-
memory/5020-335-0x000000001C902000-0x000000001C903000-memory.dmpFilesize
4KB
-
memory/5020-288-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-341-0x000000001C908000-0x000000001C909000-memory.dmpFilesize
4KB
-
memory/5020-339-0x000000001C907000-0x000000001C908000-memory.dmpFilesize
4KB
-
memory/5020-282-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-286-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-285-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-284-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-283-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB
-
memory/5020-291-0x00007FFE4CBB5DA0-0x00007FFE4CC82DA0-memory.dmpFilesize
820KB